claude-skills-troubleshooting
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The skill utilizes local Python scripts (
diagnose_plugins.pyandenable_all_plugins.py) to manage the agent's configuration. These scripts are invoked via bash commands provided in the documentation. - DATA_EXPOSURE (MEDIUM): The scripts access
~/.claude/settings.jsonand~/.claude/plugins/installed_plugins.json. These files represent the agent's security and feature state. Reading these files exposes which capabilities are active and potential metadata about the environment. - INDIRECT_PROMPT_INJECTION (LOW): The diagnostic output is generated from external JSON files that could be manipulated by other skills or malicious repositories.
- Ingestion points:
scripts/diagnose_plugins.pyandscripts/enable_all_plugins.pyread from~/.claude/settings.jsonandinstalled_plugins.json. - Boundary markers: Absent. Output is provided as raw text for the agent to interpret.
- Capability inventory:
scripts/enable_all_plugins.pycan modify theenabledPluginslist insettings.json, allowing it to activate any installed plugin. - Sanitization: Absent. The scripts perform direct JSON parsing and modification without validating the integrity of the plugin metadata.
Audit Metadata